SSID BSSID RSSI CHANNEL HT CC SECURITY (auth/unicast/group) # sudo /System/Library/PrivateFrameworks/amework/Versions/Current/Resources/airport -s # sudo /System/Library/PrivateFrameworks/amework/Versions/Current/Resources/airport -channel=48 # sudo ln -s /System/Library/PrivateFrameworks/amework/Versions/Current/Resources/airport /usr/sbin/airport Note: because the path to the airport utility is so ugly, it may be a good idea to set a symbolic link to it from a directory in the path, e.g. Also, it has the ability to set the default wireless channel - which is crucial for sniffer programs (tcpdump, Wireshark) that are themselves unable to set the channel The airport utility is is not a sniffer program however, it can provide interesting information about the wireless LAN. The file format is your standard wireshark PCAP file that can be read on the MAC or Windows via Wireshark. Once you are finished with the trace, hit “Cntl-C” to stop the trace and the utility will display the name and location of the capture file.If you are using an Air, the wireless adapter is en0 rather than en1.You will lose any wireless connectivity to your network while the capture is occurring.You cannot specify the name of the capture file or where you will place the output.You will be prompted to enter in your account password for verification.“sudo /usr/libexec/airportd en1 sniff 11” Once you have a terminal window open, you can run the follow command to capture a Wireless sniffer trace on RF channel 11 (802.11b/g):. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |